Thursday, January 6

The EU Must Stop Hungarian Net Censorship

Posted by Anonymous On 12:22 AM

we support the blackout 4 hungary.net campaign for a free internet

La Quadrature du Net joins the blackout operation launched by Hungarian civil rights activists who oppose the newly enacted media law. Everybody is invited to join the blackout and contact their representatives to oppose any kind of censorship in the European Union.

This law imposes a stringent regulation of printed, audiovisual and online media which severely undermines the democratic foundations of the Hungarian republic.

Today, La Quadrature also sent a letter to the European Commission and the President of the EU Parliament to ask them to take concrete steps to protect freedom of expression in Hungary.

The music is revolutionary. No one can prohibit hear...

Letter to EU institutions

Dear Mr. Barroso, President of the European Commission,
Dear Mrs. Reding, Vice-President of the European Commission, in charge of Justice and fundamental rights,
Dear Mrs. Kroes, Vice-President of the European Commission, in charge of the Digital Agenda,
Dear Mr. Buzek, President of the European Parliament,

As Hungary takes over the Presidency of the EU Council, we want to add our voice to those of the many civil society and governmental organizations who have denounced the dangerous drift toward a regime of a priori political control of information in this EU country. We ask you to take urgent and concrete steps to oppose it.

As you are aware, Hungary's new media law creates a compulsory registration system for all content providers, including websites. Such a provision directly contravenes the declaration on freedom of communication on the Internet adopted by the Committee of Ministers of the Council of Europe on May 28th, 2003. The declaration provides that "the active participation of the public, for example by setting up and running individual websites, should not be subject to any licensing or other requirements having a similar effect". What is more, the law creates an administrative authority that will have the power to enforce drastic restrictions on free speech across the whole public sphere. The press as well as websites will be subject to the regulatory power of a political body whose independence is far from effective. This would be a unique situation in the European Union, and in liberal democracies around the world.

Freedom of expression is the cornerstone of democracy. When the benefits of the Internet should hold us clear of unnecessary restrictions on free of speech – especially for private individuals – this law takes us decades backward by creating the structure of a censorship regime. The Internet can help us improve the functioning of our democracies by allowing anybody to engage in democratic deliberation: controlling elected representatives, evaluating the way they exert their duties, coming up with viable political propositions that can be taken into account by democratic institutions, thus legitimising the political power. But if the public sphere is crushed by the control of the State, who can use vague concepts such as "objectivity" to enforce stringent sanctions, then deliberation is hindered and society drifts away from the democratic ideal.

Such a law is not tolerable in the European Union, nor anywhere else for that matter. If it is upheld, the Hungarian Presidency of the EU Council will send a disastrous message to the rest of the world. All EU countries should be held to the highest democratic standards. Even if a comprehensive framework for protecting freedom of expression on the Internet is not yet available at the EU level, the provisions of the Charter of Fundamental Rights and of the Treaties enable you to take immediate action to protect European values. If these values are to mean anything, then you – as guardians and representatives of the Union – cannot just sit back and go on to "business as usual". The Treaty provides a procedure to sanction a Member State that fails to respect its commitment to the universal values embodied by the European project. We ask you not to hesitate to launch the procedure provided by article 7, which can lead to the suspension of that Member State' rights in EU institutions.

Urgent and decisive action is needed now that the law has already come into force. Freedom of expression is the basis of our democratic society, and realpolitik cannot be an excuse for inaction against attacks on democracy, especially when such attacks occur in the Union. We trust that you will adopt the right path of action, and defend the fundamental rights of our fellow EU citizens in Hungary.

Sincerely,

Philippe Aigrain, Gérald Sédrat-Dinet, Benjamin Sonntag et Jérémie Zimmermann, co-founders of La Quadrature du Net.

Via laquadrature.net

Wednesday, January 5

WikiLeaks has turned into a torrent

Posted by Anonymous On 11:42 PM

Oslo newspaper Aftenposten continues to churn out stories related to the content of more than 250,000 diplomatic cables that the US had intended to keep secret. Among the topics: Sri Lankan dealings with Iran, alleged French espionage and German-US spy satellites, and Israel’s plans for war.

Here follows a summary of revelations emerging recently from the WikiLeaks documents to which Aftenposten has gained access:

# French officials have been accused in American diplomatic cables of being behind more industrial espionage in Europe than both the Russians and the Chinese. In Norway, special police intelligence unit PST has warned that foreign firms are constantly on the lookout for valuable information about Norwegian products.Among the notes written by the US ambassador in Berlin, the French were referred to as “the evil empire” when it comes to trying to steal technology, “and Germany knows it,” according to the director of a large German firm.

The music is revolutionary. No one can prohibit hear...

# German intelligence agents are developing new secret spy satellites in cooperation with the US, according to reports from the US Embassy in Berlin. The satellites were being disguised as part of an environmental measure to help reverse climate change, but WikiLeaks documents reveal that they are capable of surveillance all over the globe, also underground.German officials later denied the so-called HiROS (High Resolution Optical System) satellites were part of any military program and called reports they would be used for spying "humbug".

# Sri Lanka, during the final stages of its war against the Tamil Tigers (LTTE), was reportedly in negotiations to buy rocket launchers and other military equipment from both Iran and North Korea. US officials threatened Sri Lanka with costly sanctions if the weapons deals were carried out. Any purchases would have been in violation of UN resolutions against trade with either country.Sri Lankan officials denied they were in the process of illegal weapon purchases, but the US ambassador in Colombo wasn’t convinced. There was no comment on any deals with North Korea.

# Top Israeli military officials told a US Congressional delegation in November 2009 that Iran has 300 Shihab missiles that can reach Israel, and that the missile threat was more serious than ever before. Israel would have approximately 12 minutes to respond to an attack, and war would be underway.The threat, revealed in WikiLeaks documents, explains why Israel puts such importance on missile defense. The documents also reveal that Israel is in the midst of full preparations for another war in the Middle East.

Via Newsinenglish.no

A New Year's Message From Anonymous

Posted by Anonymous On 1:32 AM

Greetings.
We are Anonymous.
The year is 2011.

Individually, we each sit powerless, watching the world transform.
Collectively, we possess the power to transform the world.

They wont listen to you, we will make them hear us.
Let the politicians know.
Let the social leaders know.
Let the bankers know, let the marketers know.
Let the observers know, let the soldiers know.
Let the critics, the celebrities, the businessmen,
the homeless, the rich, the poor, the police, the criminals,
the seniors, and the children know.

The music is revolutionary. No one can prohibit hear...

Let the people know that we're mad as hell and we're not going to take it anymore.

As a global hive mind, we can attack without leaders, without commands.
Led only by an idea, nay, a feeling. A need to be heard, a need for change.
A social revolution.

Take to the streets, write your message on their buildings.
Take this cause to the ends of the internet, take it to the steps of their capitol buildings.
There is no "extreme," there is no clear line, we fight only in shades of grey.
We know our enemy, and we know our allies.

This is a call to arms, Anonymous!

They will fear our name and know our cause.

We are Anonymous.

We are Legion.

Expect us.

Via 4chan.org

Tuesday, January 4

Global Internet Censorship

Posted by Anonymous On 3:44 AM

At the beginning of this year EFF identified a dozen important trends in law, technology and business that we thought would play a significant role in shaping digital rights in 2010, with a promise to revisit our predictions at the end of the year. Now, as 2010 comes to a close, we're going through each of our predictions one by one to see how accurate we were in our trend-spotting. Today, we're looking back on Trend #3, Global Internet Censorship, where we predicted the following:

The music is revolutionary. No one can prohibit hear...

For years, the obvious benefits of an uncensored Internet have kept advocates of Net blocking on the defensive. But new filtering initiatives in Australia and Europe combined with growing rhetoric around child protection, cybersecurity and IP enforcement means that blocking websites isn't just for authoritarian regimes any more.

That's not to say tyrants aren't paying close attention to the West's new censors. When democratic governments complain about Iran and China's net policing in 2010, expect defenses of "we're only doing what everyone else does".

2010 will see the publication of Access Controlled, a new book from the OpenNet Initiative chronicling the globalization of Internet censorship; we're excited to see it but concerned about the ways restrictions in different countries reinforce each other.

Shortly after this prediction, there was some encouraging news: U.S. Secretary of State Hillary Rodham Clinton staked out clear a position for the American Government in favor of global online freedom and against Internet censorship. But subsequent developments have been much less encouraging. In fact, as 2010 draws to an end, the United States has veered dangerously towards becoming a significant Internet censor itself.

One push for censorship has come from big media businesses, who are trying to have the government create blacklists to censor the domain name system for copyright enforcement purposes. Officials from the Department of Homeland Security have announced that they believe they don't even need new laws before they begin censoring websites, and they have begun seizing domain names. For defenders of a free and uncensored global network, this is a calamitous development, and we are already seeing reports that DHS is shutting down websites that are helping, not hurting, artists. As is often the case, censorship is hurting those it was intended to protect.

The other push for Internet censorship is a response to Wikileaks. Wikileaks has been subject to an astonishing amount of informal government pressure, which convinced a string of Internet hosting companies to drop the site. These are troubling developments.

As 2010 draws to a close, the United States faces two paths forward. There is the low road, continuing and expanding this new American brand of Internet censorship. And there is a high road: to remember that the First Amendment protects everyone's right to speak, even if the government disapproves of the things they say or the data they publish. If the United States takes the high road, there will still be a difficult and protracted battle to persuade the world's governments that Internet censorship is bad policy. If the United States takes the low road, the battle is already lost.

by Peter Eckersley
Via Electronic Frontier Fundation

Consumer bankruptcies hit 5-year high in 2010

Posted by Anonymous On 12:38 AM

NEW YORK — The number of U.S. consumers who filed for bankruptcy protection in 2010 was the highest in five years, and the figure could rise as Americans struggle with excess debt in an uncertain economy, a report issued Monday said.

Roughly 1.53 million consumer bankruptcy petitions were filed in 2010, up 9 percent from 1.41 million in 2009, according to the American Bankruptcy Institute, citing data from the National Bankruptcy Research Center.

Filings in December totaled 118,146, up 4 percent from a year earlier and 3 percent from November's total.

The music is revolutionary. No one can prohibit hear...

The full-year total is the highest since the 2.04 million recorded in 2005, when there was a rush to seek bankruptcy protection ahead of a stricter federal law taking effect in October of that year.

Samuel Gerdano, executive director of the ABI, said filings are rising even as consumers try to cut spending and debt after the 2008 financial crisis and accompanying recession, and with the unemployment rate at 9.8 percent.

He said there is usually a 12- to 18-month lag between declines in consumer spending and bankruptcy levels.

According to the Federal Reserve, U.S. consumer credit outstanding has fallen in 19 of the last 21 months for which data are available, declining to $2.41 trillion in October 2010 from $2.57 trillion in January 2009.

"Consumers have been on sort of a strike when it comes to taking on more debt, as they become more aware of the dangers of high debt burdens in a weak economy," Gerdano said.

Robert Lawless, a bankruptcy professor at the University of Illinois College of Law in Champaign, said the pace of filings may peak in early 2011 but that full-year filings could drop by a single-digit percentage.

"Consumer debt is declining, which means the incentive for taking the legal step of filing for bankruptcy is going down," he said. "I suspect borrowing demand has also gone down, but the bigger reason is that lenders are less willing to lend."

There were 2.94 million U.S. consumer bankruptcy filings in 2009 and 2010, the most over a two calendar year period since the 3.6 million recorded in 2004 and 2005.

"The (2005) law was supposed to reduce filings, but we are very close to levels we were at then," Gerdano said. "The laws of economic gravity are more powerful than the laws passed by Congress."

By Jonathan Stempel
Via MSNBC (Original by REUTERS)

Monday, January 3

‘Imagine a Julian Assange in every state and major city in the US’

Posted by Anonymous On 9:46 AM


Despite newsroom layoffs in 2010 and economic forecasts that this may be a tough year for media companies, several top investigative journalists say 2011 could be a turning point for their craft. The group — which represents print, broadcast and online; national and local; profit and nonprofit organizations — predicts we may be entering a new era of investigative reporting. They expect to see:
* an increase in nonprofit investigative journalism organizations that partner with legacy newsrooms to produce meaningful work;
* investigative and enterprise reporting grow as a key distinguishing feature of newsrooms that prosper in 2011;
* a wider range of “investigative” work that can be delivered on many platforms, including mobile, social media and through micro-local Web networks;
* the hottest investigative stories of 2011 will be about federal spending;
* a need for all journalists to learn new skills in social media and database reporting;
* fallout from the WikiLeaks controversy that they say will make it harder to get information, including public records.

We asked top investigative journalists these questions:

* How have layoffs and buyouts affected investigative/enterprise work this year? Do we end 2010 any better or worse where investigative reporting is concerned?
* What are the big emerging trends that you see for investigative reporting in 2011 and beyond? What role will nonprofit investigative centers have?
* What worries you most about the future of investigative reporting?
* What are the essential skills that every journalist will need in 2011 to do investigative work?
* What are the topics that will produce the most important stories in 2011?

Below we highlight answers from these five journalists:

* Joe Bergantino, Director/Senior Investigative Reporter for the New England Center for Investigative Reporting
* Alison Young, USA Today Investigative Reporter and President of the Investigative Reporters and Editors Board of Directors
* David Raziq, KHOU-TV (Houston) Executive Producer for Investigations. In the last decade his team has won every major broadcast journalism award, including duPonts, Peabodys and IRE medals.
* Polly Kreisman, Emmy award-winning reporter, started a micro-local community website and now heads InvestigateNY.org, a nonprofit center for investigative reporting that launches in January 2011.
* Cheryl Phillips, Data Enterprise Editor at The Seattle Times and Chairman, IRE Board of Directors; Pulitzer finalist and one of the editors involved in breaking news coverage last year which received a Pulitzer Prize.

Here’s what they told us.

Layoffs take a toll, but investigative reporting thrives

Cheryl Phillips: 2010 was marked by a slowdown in the number of layoffs and buyouts and a bit more stabilization. What’s more, many longtime investigative journalists who had taken buyouts a year or so ago re-emerged at new journalism homes. Some moved to nonprofit shops. California Watch, for example, expanded. Other journalists married academia and the real-world by working with students to do strong investigative work. The key thing is that many folks with strong investigative and watchdog chops didn’t just go away. They recreated themselves but still kept that focus in investigative/watchdog journalism.

Joe Bergantino: The most promising news is that many of the investigative reporters who’ve left mainstream newsrooms have decided to start their own nonprofit investigative reporting centers to continue their work. The number of centers is growing rapidly nationwide. Those centers, in some cases, now offer readers, viewers and listeners more in-depth investigative stories than their local newspapers or TV stations.

Another major development this past year was the rapid expansion of The Center for Public Integrity (CPI). The Huffington Post’s investigative unit merged with CPI to form the largest nonprofit investigative reporting center in the country. CPI, along with ProPublica, which won a Pulitzer Prize in 2010, are producing a constant flow of top-notch investigative reports.

David Raziq: From the standpoint of my own company and station, not only have we not reduced our investigative reporting efforts, but we now have an additional group of newsroom reporters selected to focus on generally shorter-turn investigations. Those efforts — in conjunction with the Unit I have been a part of for the past 13 years (where we tend to focus on long-term, large scope investigations) — has definitely increased the enterprise/investigative output of our station.

Alison Young: Many legacy newsrooms, after staff reductions, are seeking to do more watchdog reporting in response to reader and viewer interest. They’re coming to groups like IRE to invest in staff training and when they’re making hiring decisions, they are often looking for reporters with watchdog and investigative skills. (USA TODAY, for example, just reorganized its newsroom and created a five-person investigative team, with four reporters and an editor.)

Trend: Nonprofit newsrooms will continue to grow

Joe Bergantino: Nonprofit investigative centers are now a major force. Some of the best investigative reporting in the country is flowing out of local centers, as well as the big national centers in Washington, New York and San Francisco.

Polly Kreisman: The idea is to have enough of these organizations working successfully around the country (about 40 so far are members of the Investigative News Network) so traditional media will come to rely on this model and support it, even mainstreaming it.

Cheryl Phillips: Nonprofit sites and academic institutions will continue to try to fill the hole left by the decrease in investment in investigative journalism at many newspapers. And those organizations will partner with the newspapers to expand the reach and, therefore, the power of the work being produced.

For their part, the newspapers will engage in these collaborations for the same reason. I think most editors shrunk investigative staffs reluctantly. Good local investigations that help serve the public are the bread and butter of what we do. Plus, they get results and readership. Partnering just makes sense.

Joe Bergantino: Three things worry me most:

* Will nonprofit centers be able to come up with a sustainable business model that ensures their long-term survival or will they, one by one, shut down because of lack of funding?
* As more mainstream media outlets use investigative reporting as a way to boost readership and ratings, will the reporting be worth reading or watching?
* Will the WikiLeaks controversy result in a backlash that leads to less access to government documents?

Investigative reporting requires data, search, social media skills

Joe Bergantino: Investigative reporters in 2011 not only need to know all the basics, including how to crunch data, they also need to know how to tap into the crowd for information, funding and access to public and private sector documents. Imagine a Julian Assange in every state and major city in the US.

David Raziq: I think they are going to have to be multimedia journalists, and that also includes the various methods of making their audience aware of an upcoming story. And they’ll have to keep up with it too, be consistent at it, because the competition for readers/viewers is just getting fierce.

Cheryl Phillips: They should learn some basic data skills. They should learn some basic social media skills. They need to use Twitter — and not just to tweet their stories, but to follow what other people are doing and to watch for trends.

They need to know how to do more than just a basic Google search — how to search for specific types of documents, how to search scholarly databases and repositories of business information.

They need to understand how to use Facebook. They need to follow their area of expertise with social media.

They should check out Storify and GeoCommons and they should not be afraid to adopt new methods of collecting and sharing information. An example would be using DocumentCloud to parse through large PDFs and then make some of that information public.

Historically, investigative journalists have collected reams of information and then in writing their story, left much of that raw information in their desks and in their minds. They become the expert on the topic. They should still be the expert on that topic — but the investigative journalist of today also needs to share much more information, allowing the reader to explore the story in even more depth and drive that exploration themselves.

A recent collaboration The Seattle Times did with ProPublica involved the collection and analysis of foreclosure data. Upon publication, that data — which otherwise might have sat dormant — was provided to anyone else who wanted it, which might help extend the story.

Alison Young: Journalists today have more tools than ever before to help them investigate important stories. The availability of data, electronic access to information and new technologies that allow for analysis, visualization and publication have created amazing opportunities for investigating and telling stories. …

Learning how to use spreadsheets is critical. It’s the foundation for doing so many kinds of investigative stories, whether you’re importing data or building your own data set. Twitter and other social networking tools can be helpful. But spreadsheets and databases are critical.

A great example is Daniel Gilbert’s Pulitzer-winning investigation of mineral rights royalties. It shows the power of data journalism, even if you’re just one reporter in a small newsroom.

Learning effective time management — how to manage and juggle daily responsibilities with long-term investigations — is also important for anyone wanting to carve out more time for in-depth reporting.

Polly Kreisman: Every reporter should know how to:

* set up a WordPress site;
* understand SEO;
* be able to mine the deep Web;
* edit video;
* embed digital photographs;
* know how to leverage the impact of information via social media;
* understand the limits of social media.

…all while continuing to hone excellent writing and reporting skills and constantly monitoring the changing landscape of media and emerging technologies and platforms.

Trends: More local, socially distributed investigations

David Raziq: …what I see are young, tech-friendly reporters doing more and more sophisticated investigations and information analyses with CAR. Add in our continually improving information technology and I think we could see some amazing stories.

Cheryl Phillips: I have a multi-part answer.

The continued marrying of data and investigative/in-depth journalism. Data is the underlying information beneath a story. Inside data on any topic are the stories of people and how their lives are changing, or how well the public is being served. The big shift will be the increasing use of this data in interactive ways that tell a story along with the traditional narrative.

I think there will continue to be more use of information collected from readers that will then be used tell broader-stroke stories. However, I think along with this trend, journalists will also have to continue to fight to obtain public data for use in investigative reporting.

There are troubling efforts to shut down public data. And in this era of cost-cutting, it is imperative that journalists don’t fall down in their responsibility to fight for access to information on behalf of the public.

Without public employee information, we might never have been able to report in Seattle on school coaches who preyed on student-athletes. Without fighting the improper sealing of court records, we would not have been able to report on flawed medical devices or a flawed court guardianship system. Keeping public records public is an imperative.

Mobile. More and more news will move onto a mobile platform and I think that investigative work will end up being split into different forms depending on the platform. Just as now news organizations tweet the news of their latest investigations with links to the full stories, a mobile platform may provide an opportunity for a synopsis of a project with links to other versions.

The difference is that some of this mobile platform will include more video and more visualization. I think data visualization will increasingly be built on platforms that will accommodate mobile.

A continued migration of investigative journalists to Web-only sites and the increasing use of social media by investigative journalists. For example, much more Twitter-investigative source work. Investigative journalists may truly discover how to mine the best of Twitter for source development and trends.

Quick-hit daily investigative work at a micro-local level. Think Patch. Think local bloggers. In Seattle, for example, we have a partnership with multiple local blog news sites and have worked with those sites already for many daily stories, as well as a project on homelessness in our community. The journalists at these local sites can develop strong sources and can be on the scene of a breaking news event quickly. A good number of these reporters have journalism experience already and those who don’t are seeking out training.

Government spending, environmental issues will be big stories in 2011

Joe Bergantino: We only have begun to scratch the surface of the $700 billion in stimulus spending over the past two years. Follow the money and dig; there’s much more to uncover. Same holds true for the budget-cutting process ahead on the national, state and local levels. It deserves close scrutiny.

Health care costs and cutbacks, Wall Street’s “creativity,” money and politics, and the ongoing domestic human toll of the wars in Iraq and Afghanistan are topic areas that every investigative reporter needs to explore.

David Raziq: think the failing infrastructure of the U.S. is something we just need to keep reporting on, and on a local basis there is just so much going on. And that also includes your public drinking water purification and delivery system, something my team has been reporting on for months now.

I think a real analysis needs to be done on the FDA because we have products coming into this country and also being made in this country that instead of regulating, the FDA is just allowing the American public to be guinea pigs for them, not catching problems until, as Richard Clarke said, “there are bodies on the ground.”

I also think the effect of the recent Supreme Court ruling on corporate political contributions will definitely need to be investigated.

Cheryl Phillips: Follow the money and the story will follow. I think good investigative stories can be found almost anywhere. I would suggest parsing just how government money is being spent — especially in this era of budget-cutting. Whose budget is not being cut and what loopholes are out there that ensure certain businesses or certain individuals continue to collect larger sums of money?

…Find out the action — get the story tip, then dig into it to see what’s there — through people and through data that represent them.

Al Tompkins
Via poynter.org

Pentagon Whistleblower Daniel Ellsberg: Julian Assange is Not a Terrorist

Posted by Anonymous On 8:20 AM

After WikiLeaks founder Julian Assange was arrested in London, an international group of former intelligence officers and ex-government officials released a statement in support of his work. We speak to one of the signatories, Daniel Ellsberg, the famous whistleblower who leaked the Pentagon Papers about the Vietnam War in 1971. "If I released the Pentagon Papers today, the same rhetoric and the same calls would be made about me," Ellsberg says. "I would be called not only a traitor—which I was then, which was false and slanderous—but I would be called a terrorist... Assange and Bradley Manning are no more terrorists than I am."

AMY GOODMAN: In December, Julian Assange was arrested in London on an international warrant to face sex crimes allegations in Sweden. While he was in jail in solitary confinement in London, Democracy Now! went to Cancún, Mexico, to cover the U.N. climate talks. While there, Dan Ellsberg joined us in our New York studio. Ellsberg is perhaps this country’s most famous whistleblower. In 1971 he leaked the Pentagon Papers, the secret history of the U.S. involvement in Vietnam. He’s been speaking out in support of Julian Assange and WikiLeaks. He spoke about the targeting of Julian Assange.

DANIEL ELLSBERG: Well, as I listened to Attorney General Holder on your program just now, I realize that he’s in the same position of that Attorney General Mitchell was in 40 years ago with the Pentagon Papers when they came out. We have an act of free speech, of free press, of informing the public, an act in search of a crime, in search of a law that would call it criminal. No one had ever been prosecuted for what I had done then, revealing top secrets. There had been many leaks in the past, then as now, and no one had ever been prosecuted. I was the first. The act they found was the Espionage Act, which was passed in 1917, was never intended to work as an Official Secrets Act, as in England, which would criminalize any release of classified information. But they tried it on me. I was faced with a possible 115 years in prison, which is the kind of sentence they would love to hang on Bradley Manning, who is accused of being the leaker in this case. We don’t know if he was, but I’m going to give him credit for it, since I regard it as a very admirable act, for which I thank him at this time. And if he’s—if the credit is not due, it’s due to the source, whoever that was.

So, I think, actually, what this is about, to a large extent, is trying to, once again, to instate the Espionage Act as if it were an Official Secrets Act, use it to cut down, close off unauthorized disclosures to the American public from inside the government, and also to accompany that with a legislative move to supplement it with an act that is explicitly an Official Secrets Act, one that clearly Congress intends to criminalize any release of classified information, such as the one you were just quoting to—in Cancún. I was interested that the recent release—Amy, you must have been reading it, actually, unlike most people, and found something of note in the cables that were released by the New York Times, given to them by WikiLeaks, and eventually by the source, about what Bradley Manning is reported to have said, the U.S. throwing its weight around against the poor countries of the world to exploit their resources, something that he said he was determined to expose to the American people.

AMY GOODMAN: In the letter that you’ve joined with others, very significantly among them Larry Wilkerson, the former chief of staff of then-Secretary of State Colin Powell, you are fiercely critical of the media. Talk about the role that it has played.

DANIEL ELLSBERG: Well, in this case, as in the Pentagon Papers, I do give the New York Times credit for working with these materials and presenting material to their readers. And in fact, there really—if they find a crime, or if they invent a crime or pass a crime—criminal law that would cover WikiLeaks, it will cover the New York Times, and you, Democracy Now!, and anyone who presents news that in part reflects leaks, unauthorized disclosures from within the government.

Actually, the wording of the Espionage Act, which, as I say, was not intended for this purpose, but the wording of it is so broad that it applies to readers of this classified information. If they are unauthorized possessors, which they are from the point of view of the government, then they can’t discuss it. They can’t join chat logs, let’s say, discussing it, and they have to, quote, "return" it, which is quite challenging with digital material like this. But they’d have to return their copy of the New York Times, I guess, to the Justice Department. That actually is in line with what the government has been saying right now, directing its employees that they cannot download WikiLeaks or the New York Times sites that reports the WikiLeaks onto their computers at work or at home—just where that leaves their family members, for instance. Is it possible that it could be discussed around the family table, if someone else has downloaded it?

We’re in an absurd position here with a close down of public discussion of official matters, very similar to that of China. In fact, I even wonder whether there’s a rule that absurd in China. And that’s the kind of information system, I think, that our leaders aspire to, and have for a long time.

AMY GOODMAN: Julian Assange has been the target of assassination and arrest calls from a number of U.S. politicians and commentators since the release of the diplomatic cables. This week, a Democratic Party consultant, Fox Business commentator Bob Beckel, called for illegally shooting Assange. This is what he said.

BOB BECKEL: We’ve got special ops forces. I mean, a dead man can’t leak stuff. This guy’s a traitor, a treasonous, and he has broken every law of the United States. The guy ought to be—and I’m not for the death penalty, so if I’m not for the death penalty, there’s only one way to do it: illegally shoot the son of a [bleep].

AMY GOODMAN: OK, now, that’s Bob Beckel. That’s Bob Beckel, Dan Ellsberg, on Fox, right? Bob Beckel, who was what? What was he? The campaign manager for Walter Mondale in 1984, in the presidential campaign of Walter Mondale?

DANIEL ELLSBERG: Well, it’s appalling. I didn’t remember that, but it’s appalling. You are reminding us that it’s not only Republicans like Sarah Palin and others, and Peter King, who will be a high—have high position in the House in the next term, who are calling for this kind of thing. In my case—I’m sure, by the way, that if I released the Pentagon Papers today, the same rhetoric and the same calls would be made about me at this time, the same material, same instigations. I would be called not only a traitor, which I was then, which was false and slanderous, but I would be called a terrorist, as a matter of fact. Now, that’s the word today for someone who is beyond the pale of any rights, of any rights of citizenship or any human rights, someone who can be just dealt with summarily like that. The reason for calling for illegal shooting, which is an odd and unusual call, is, as I said at the beginning, because our legal system, with its glorious First Amendment, we don’t have a law that makes it clearly illegal to do what—the truth telling that WikiLeaks and New York Times and Julian Assange has done. Assange and Bradley Manning are no more terrorists than I am, and I’m not.

And that is a—it’s appalling that our conversation after 9/11, in the last ten years, has reached a point where what Nixon did to me covertly can now be called for and actually done openly and very specifically. Nixon brought a dozen Cuban American émigrés, Bay of Pigs veterans, up from Miami to at least beat me up. The words were "incapacitate Ellsberg totally," which covers the word "kill," which, as their prosecutor said to me at the time, these guys, who were CIA assets, they don’t use the word "kill." They avoid it. They use words like "neutralize" and "eliminate" and "with extreme prejudice," "terminate," that sort of thing. They avoided the word "kill." I notice that the change now is that not only is that, which was a covert action, which actually was critical in bringing Nixon down because it was recognized as not only illegal, but really against American values in a fundamental sense, that has now become something you can talk about quite openly. And even the President can refer to special operations teams worldwide whose work is to capture or kill. The word "kill" is no longer avoided in these circles.

AMY GOODMAN: Pentagon Papers whistleblower Dan Ellsberg. And that does it for our show, but certainly not for our coverage of WikiLeaks.




Via democracynow.org

Facing WikiLeaks Threat, Bank Plays Defense

Posted by Anonymous On 8:11 AM

By the time the conference call ended, it was nearly midnight at Bank of America’s headquarters in Charlotte, N.C., but the bank’s counterespionage work was only just beginning.

A day earlier, on Nov. 29, the director of WikiLeaks, Julian Assange, said in an interview that he intended to “take down” a major American bank and reveal an “ecosystem of corruption” with a cache of data from an executive’s hard drive. With Bank of America’s share price falling on the widely held suspicion that the hard drive was theirs, the executives on the call concluded it was time to take action.

Since then, a team of 15 to 20 top Bank of America officials, led by the chief risk officer, Bruce R. Thompson, has been overseeing a broad internal investigation — scouring thousands of documents in the event that they become public, reviewing every case where a computer has gone missing and hunting for any sign that its systems might have been compromised.

In addition to the internal team drawn from departments like finance, technology, legal and communications, the bank has brought in Booz Allen Hamilton, the consulting firm, to help manage the review. It has also sought advice from several top law firms about legal problems that could arise from a disclosure, including the bank’s potential liability if private information was disclosed about clients.

The company’s chief executive, Brian T. Moynihan, receives regular updates on the team’s progress, according to one Bank of America executive familiar with the team’s work, who, like other bank officials, was granted anonymity to discuss the confidential inquiry.

Whether Mr. Assange is bluffing, or indeed has Bank of America in its sights at all, the bank’s defense strategy represents the latest twist in the controversy over WikiLeaks and Mr. Assange.

The United States government has been examining whether Mr. Assange, an Australian, could be charged criminally for the release by WikiLeaks of hundreds of thousands of classified Pentagon and State Department diplomatic cables that became the subject of articles in The New York Times and other publications last month.

The Swedish government is also seeking to question Mr. Assange about rape accusations against him. As he fights extradition from Britain in that case, he remains under house arrest in an English mansion. Mr. Assange has said the timing of the rape accusations was not coincidental, and that he was the victim of a smear campaign led by the United States government.

Despite his legal troubles, Mr. Assange’s threats have grown more credible with every release of secret documents, including those concerning the dumping of toxic waste in Africa, the treatment of prisoners held by the United States at Guantánamo Bay, the wars in Iraq and Afghanistan and, most recently, the trove of diplomatic cables.

That Mr. Assange might shift his attention to a private company — especially one as politically unpopular as Bank of America or any of its rivals, which have been stained by taxpayer-financed bailouts and the revelation of improper foreclosure practices — raises a new kind of corporate threat, combining elements of law, technology, public policy, politics and public relations.

“This is a significant moment, and Bank of America has to get out in front of it,” said Richard S. Levick, a veteran crisis communications expert. “Corporate America needs to look at what happens here, and how Bank of America handles it.”

Last month, the bank bought up Web addresses that could prove embarrassing to the company or its top executives in the event of a large-scale public assault, but a spokesman for the bank said the move was unrelated to any possible leak.

Then, on Dec. 18, Bank of America may have antagonized Mr. Assange further when it said it would join other companies like MasterCard and PayPal in halting the processing of payments intended for WikiLeaks, citing the possibility the organization’s activities might be illegal.

Mr. Assange has never said explicitly that the data he possesses comes from Bank of America, which is the nation’s largest bank, though he did say that the disclosure would take place sometime early this year.

The bank has emerged as the most likely target because a year before the latest threat, Mr. Assange said in an interview that his group had the hard drive of a Bank of America executive containing five gigabytes of data — enough to hold more than 200,000 pages of text — and was evaluating how to present it. It was this connection that set the wheels in motion on Nov. 30.

The financial markets took the threat seriously. Bank of America shares fell 3 percent in trading the day after Mr. Assange made his threat against a nameless bank, and while the stock has since recovered, the prospect of a Bank of America data dump from WikiLeaks remains a concern, said Moshe Orenbuch, an analyst with Credit Suisse.

“The fears have calmed down somewhat, but if there is something out there that is revealed, the market reaction will be negative,” he said.

Bank of America’s internal review has turned up no evidence that would substantiate Mr. Assange’s claim that he has a hard drive, according to interviews with executives there. The company declined to otherwise comment on the case. A WikiLeaks representative also declined to comment.

With the data trail cold, one working theory both inside and outside the bank is that internal documents in Mr. Assange’s possession, if any, probably came from the mountains of material turned over to the Securities and Exchange Commission, Congressional investigators and the New York attorney general’s office during separate investigations in 2009 and 2010 into the bank’s acquisition of Merrill Lynch.

As it happens, Mr. Assange’s first mention of the Bank of America hard drive, in October 2009, coincided with hearings by the House Committee on Oversight and Government Reform into the Merrill merger, and with wide-ranging requests for information by the committee.

The bank’s investigative team is trying to reconstruct the handover of materials to public agencies for a variety of inquiries, in pursuit of previously undisclosed documents that could embarrass the company, bank officials said.

In addition to the Merrill documents, the team is reviewing material on Bank of America’s disastrous acquisition in 2008 of Countrywide Financial, the subprime mortgage specialist, the officials said. The criticism of Bank of America’s foreclosure procedures centers mostly on loans it acquired in the Countrywide deal, and one possibility is that the documents could show unscrupulous or fraudulent lending practices by Countrywide.

If that is the case, it would not only reignite political pressure on Bank of America and other top mortgage servicers, but it could also strengthen the case of investors pressuring the big banks to buy back tens of billions in soured mortgages.

“If something happens, we want to be ready,” one bank official said. “You want to know what your options are before it comes out, rather than have to decide on the spot.” Bank of America’s efforts are complicated by the fact that it has made several huge acquisitions in recent years, and those once-independent companies had different computer systems and security procedures.

WikiLeaks has taken on private companies in the past, including leaking documents from Barclays of Britain and Bank Julius Baer of Switzerland, but neither disclosure drew nearly as much attention.

Officials at the S.E.C., the House oversight committee and the New York attorney general’s office insist the information they received had been turned over in the form of papers and discs, never a hard drive, and deny they are the source of the WikiLeaks cache.

At the same time, Mr. Assange’s own statements would seem to undermine the government-as-source theory, hinting instead that resignations might follow as evidence emerges of corruption among top executives, something the public investigations never found.

“It will give a true and representative insight into how banks behave at the executive level in a way that will stimulate investigations and reforms, I presume,” he said in the November 2010 interview with Forbes. “For this, there’s only one similar example. It’s like the Enron e-mails.”

NELSON D. SCHWARTZ

Via BlueRidgeNow.com

Thursday, December 30

Germany expects Hungary to change media law

Posted by Anonymous On 11:58 PM

The German government expects Hungary to make changes to a new media law that would tighten government control over news outlets and has drawn criticism from fellow European Union members.

Deputy Foreign Minister Werner Hoyer told a German newspaper that he hoped Hungary would move quickly to change the law, which is set to take effect on Jan. 1. Hungary takes over the EU's rotating presidency from Belgium on Saturday.

"I assume that the final word by the Hungarian government hasn't been spoken yet on this issue," Hoyer told the Thursday edition of the Frankfurter Rundschau. "It would be very good if this issue could be cleared up quickly."

Hoyer added: "We must ensure that basic rights are guaranteed in the European Union and a free press is among the core rights. If there are doubts they need to be eliminated. Even if I don't know the exact wording of the new law, there are indeed doubts."

Hungary's parliament passed a law last week which tightens government control over news outlets. Media watchdogs say it is arbitrary and ill-defined and several leading European newspapers have issued strong protests against it. [ID:nLDE6BM09M]

Luxembourg Foreign Minister Jean Asselborn has said the law violates the "spirit and letter" of EU treaties and urged the European Commission to take swift action in response.

Hungary's Prime Minister Viktor Orban has vowed to stick with the legislation and attributed the backlash to a lack of understanding of domestic issues in his country.

The new National Media and Communications Authority (NMHH), dominated by people loyal to the ruling Fidesz party, will oversee all public news production and its powers will include levying big fines on private media that violate the law.

Via reuters.com

#anonymous communique to cultural industry

Posted by Anonymous On 2:27 AM

This is a message for you, mighty of the world:

Cry, you cry, angry, insult us, you set very serious and proclaim new laws, will threaten us with jail, you call the defense with big words and principles, you try to scare us with a gray world without culture and entertainment that we will be guilty .
You use all the resources that happen to you with a single purpose: business as usual.
Under all the noise that you generate, under all empty words, what is the change you propose, What new society you want create? Exactly that. Your proposal is that nothing changes, everything continues as it is.
If you were able to take a step back and look at how the world works now, you realize that is the worst thing you could want.

Luckily, what you will do no matter. We have another plan. We're going to explain you:

* The first thing we do is break the copyright. All intellectual work will become the heritage of humanity. The genes are not patentable, medicines are not patentable, the technology will not be patentable, the textbooks are not patentable. The quality of education will be exactly the same in the best universities in the world and what is now the third world. All the world's countries have at their disposal all the tools ever designed by man to achieve a decent quality of life, to choose their future.
At the same time, the whole culture created during the history of man is realistically accessible by anyone on the planet. Not only we are not going to end the culture, it will flow and enriches will ever has. By the way cultural industries will fall and we breathe a sigh of relief, remembering that they were just that, business.
Beside the cultural industry will fall Mass Media to tell us what to think and how to think. The information will be absolute, your secret will never again be secret. The information will be continuously analyzed, understood and disseminated by the Internet, for us. Each of the citizens of this planet with their individual contributions to create a great global mind.

* The second thing we do is to regain power. We gave the monopoly of power and strength to you during a historical period because we had no way to organize, because we had not invented the concept, because the technique had not conquered fate yet.
But we have grown. We have tools to organize and a goal to reach. And you are not only unnecessary, you are a nuisance. You force us to spend most of our energies in control you, to force you to defend our interests, that you may be able to look beyond your feet.
Can not you see? We say it in every song, every movie, every gesture of discontent. It's what all we talked about, love and what we are tired of you. But that is over, because we now have our own ability to lead the world, and most importantly, we are aware of it. Do not you see the explosions of joy at what is coming? Do not you hear the roar in the background? It is the people who are beginning to realize that the power is them.

You can not stop us because, like idiots, you have the wrong role: We are the system.

Begins a new stage of history, and you can not stop.

We are the System.
We are anonymous.
We are Legion.


Via anonnews.org (Spanish)

Merged Manning-Lamo Chat Logs

Posted by Anonymous On 2:00 AM

Wired published the first chat logs on June 10, 2010. In the article, they indicate that these represent roughly 25% of the logs they received from Adrian Lamo of his chats with Bradley Manning. Later, Wired’s Kevin Poulsen told Glenn Greenwald of Salon that the logs were complete with the exception of “Manning discussing personal matters that aren’t clearly related to his arrest, or apparently sensitive government information that I’m not throwing up without vetting first.”
Lamo also provided Ellen Nakashima of the Washington Post with a complete version of the logs, which were also excerpted on June 10. And on June 19, BoingBoing published what was purported to be a more complete version of one section of the log. The three versions have been merged in the text below:

* Black text – Wired version
* Red text – Washington Post version
* Brown text – BoingBoing version
* Bold — sections BoingBoing believes to have been edited
* Orange text — Both Washington Post and BoingBoing
* Blue text – Both BoingBoing and Wired
* Pink text — Both Washington Post and Wired
* Green text — Washington Post, Wired & BoingBoing versions

May 21

(1:41:12 PM) Bradley Manning: hi
(1:44:04 PM) Manning: how are you?
(1:47:01 PM) Manning: im an army intelligence analyst, deployed to eastern baghdad, pending discharge for “adjustment disorder” [. . .]
(1:56:24 PM) Manning: im sure you’re pretty busy…
(1:58:31 PM) Manning: if you had unprecedented access to classified networks 14 hours a day 7 days a week for 8+ months, what would you do?
(1:58:31 PM) Adrian Lamo [AUTO-REPLY]: Tired of being tired
(2:17:29 PM) Manning: ?
(6:07:29 PM) Lamo: What’s your MOS?
(3:16:24 AM) Manning: re: “What’s your MOS?” — Intelligence Analyst (35F)

May 22

(12:15:11 PM) bradass87: hypothetical question: if you had free reign over classified networks for long periods of time… say, 8-9 months… and you saw incredible things, awful things… things that belonged in the public domain, and not on some server stored in a dark room in Washington DC… what would you do?
(12:16:38 PM) bradass87: or Guantanamo, Bagram, Bucca, Taji, VBC for that matter…
(12:17:47 PM) bradass87: things that would have an impact on 6.7 billion people
(12:21:24 PM) bradass87: say… a database of half a million events during the iraq war… from 2004 to 2009… with reports, date time groups, lat-lon locations, casualty figures… ? or 260,000 state department cables from embassies and consulates all over the world, explaining how the first world exploits the third, in detail, from an internal perspective?
(12:22:49 PM) bradass87: the air-gap has been penetrated… =L
(12:23:19 PM) Adrian: how so?
(12:26:09 PM) Adrian: yt?
(12:26:09 PM) bradass87: lets just say *someone* i know intimately well, has been penetrating US classified networks, mining data like the ones described… and been transferring that data from the classified networks over the “air gap” onto a commercial network computer… sorting the data, compressing it, encrypting it, and uploading it to a crazy white haired aussie who can’t seem to stay in one country very long =L
(12:27:13 PM) bradass87: im here
(12:27:24 PM) Adrian: Depends. What are the particulars?
(12:28:19 PM) bradass87: theres substantial lag i think
(12:29:52 PM) Adrian: I don’t understand.
(12:30:13 PM) bradass87: what was the last message you recieved?
(12:30:47 PM) Adrian:
(12:28:19 PM) bradass87: theres substantial lag i think
(12:30:56 PM) bradass87: before that
(12:31:09 PM) Adrian:
(12:26:09 PM) bradass87: lets just say *someone* i know intimately well, has been penetrating US classified networks, mining data like the ones described… and been transferring that data from the classified networks over the “air gap” onto a commercial network computer… sorting the data, compressing it, encrypting it, and uploading it to a crazy white haired aussie who can’t seem to stay in one country very long =L
(12:27:13 PM) bradass87: im here
(12:27:24 PM) Adrian: Depends. What are the particulars?
(12:31:43 PM) bradass87: crazy white haired dude = Julian Assange
(12:33:05 PM) bradass87: in other words… ive made a huge mess :’
(12:35:17 PM) bradass87: im sorry… im just emotionally fractured
(12:39:12 PM) bradass87: im a total mess
(12:41:54 PM) bradass87: i think im in more potential heat than you ever were
(12:41:54 PM) Adrian : I have more messages than resources allocatable to action them. Please be very patient.
(12:45:59 PM) Adrian: not mandatorily
(12:46:08 PM) Adrian: there are always outs
(12:46:17 PM) Adrian: how long have you helped WIkileaks?
(12:49:09 PM) bradass87: since they released the 9/11 “pager messages”
(12:49:38 PM) bradass87: i immediately recognized that they were from an NSA database, and i felt comfortable enough to come forward
(12:50:20 PM) bradass87: so… right after thanksgiving timeframe of 2009
(12:52:33 PM) bradass87: Hilary Clinton, and several thousand diplomats around the world are going to have a heart attack when they wake up one morning, and finds an entire repository of classified foreign policy is available, in searchable format to the public… =L
(12:53:41 PM) bradass87: s/Hilary/Hillary
(12:54:47 PM) Adrian: What sort of content?

(12:56:36 PM) Adrian: brb cigarette

(12:56:43 PM) Adrian: keep typing <3

(12:59:41 PM) bradass87: uhm… crazy, almost criminal political backdealings… the non-PR-versions of world events and crises… uhm… all kinds of stuff like everything from the buildup to the Iraq War during Powell, to what the actual content of “aid packages” is: for instance, PR that the US is sending aid to pakistan includes funding for water/food/clothing… that much is true, it includes that, but the other 85% of it is for F-16 fighters and munitions to aid in the Afghanistan effort, so the US can call in Pakistanis to do aerial bombing instead of americans potentially killing civilians and creating a PR crisis
(1:00:57 PM) bradass87: theres so much… it affects everybody on earth…
everywhere there’s a US post… there’s a diplomatic scandal that will be revealed… Iceland, the Vatican, Spain, Brazil, Madascar, if its a country, and its recognized by the US as a country, its got dirt on it
(1:01:27 PM) bradass87: i need one myself
(1:10:38 PM) bradass87: its open diplomacy… world-wide anarchy in CSV format… its Climategate with a global scope, and breathtaking depth… its beautiful, and horrifying…
(1:10:38 PM) Adrian : I have more messages than resources allocatable to action them. Please be very patient.
(1:11:54 PM) bradass87: and… its important that it gets out… i feel, for some bizarre reason
(1:12:02 PM) bradass87: it might actually change something
(1:13:10 PM) bradass87: i just… dont wish to be a part of it… at least not now… im not ready… i wouldn’t mind going to prison for the rest of my life, or being executed so much, if it wasn’t for the possibility of having pictures of me… plastered all over the world press… [...]
(1:14:11 PM) bradass87: i’ve totally lost my mind… i make no sense… the CPU is not made for this motherboard…
(1:30:32 PM) bradass87: >sigh<
(1:31:40 PM) bradass87: i just wanted enough time to figure myself out… to be myself… and be running around all the time, trying to meet someone else’s expectations
(1:32:01 PM) bradass87: *and not be
(1:33:03 PM) bradass87: im just kind of drifting now…
(1:34:11 PM) bradass87: waiting to redeploy to the US, be discharged… [...]
(1:34:45 PM) bradass87: all while witnessing the world freak out as its most intimate secrets are revealed
(1:35:06 PM) bradass87: its such an awkward place to be in, emotionally and psychologically
(1:35:06 PM) Adrian : I have more messages than resources allocatable to action them. Please be very patient.

(1:39:03 PM) Manning: i cant believe what im confessing to you :’(
(1:40:20 PM) Manning: ive been so isolated so longi just wanted to be nice, and live a normal life… but events kept forcing me to figure out ways to survive… smart enough to know whats going on, but helpless to do anything… no-one took any notice of me
(1:40:43 PM) Manning: :’(
(1:43:51 PM) Lamo: back
(1:43:59 PM) Manning: im self medicating like crazy when im not toiling in the supply office (my new location, since im being discharged, im not offically intel anymore)
(1:44:11 PM) Manning: you missed a lot…
(1:45:00 PM) Lamo: what kind of scandal?
(1:45:16 PM) Manning: hundreds of them
(1:45:40 PM) Lamo: like what? I’m genuinely curious about details.
(1:46:01 PM) Manning: i dont know… theres so many… i dont have the original material anymore
(1:46:18 PM) Manning: uhmm… the Holy See and its position on the Vatican sex scandals
(1:46:26 PM) Lamo: play it by ear
(1:46:29 PM) Manning: the broiling one in Germany
(1:47:36 PM) Manning: im sorry, there’s so many… its impossible for any one human to read all quarter-million… and not feel overwhelmed… and possibly desensitized
(1:48:20 PM) Manning: the scope is so broad… and yet the depth so rich
(1:48:50 PM) Lamo: give me some bona fides … yanno? any specifics.
(1:49:40 PM) Manning: this one was a test: Classified cable from US Embassy Reykjavik on Icesave dated 13 Jan 2010
(1:50:30 PM) Manning: the result of that one was that the icelandic ambassador to the US was recalled, and fired
(1:51:02 PM) Manning: thats just one cable…
(1:51:14 PM) Lamo: Anything unreleased?
(1:51:25 PM) Manning: i’d have to ask assange
(1:51:53 PM) Manning: i zerofilled the original
(1:51:54 PM) Lamo: why do you answer to him?
(1:52:29 PM) Manning: i dont… i just want the material out there… i dont want to be a part of it

(1:52:54 PM) Adrian: i’ve been considering helping wikileaks with opsec
(1:53:13 PM) bradass87: they have decent opsec… im obviously violating it
(1:53:34 PM) bradass87: im a wreck
(1:53:47 PM) bradass87: im a total fucking wreck right now

______________________________

(2:04:29 PM) Manning: im a source, not quite a volunteer
(2:05:38 PM) Manning: i mean, im a high profile source… and i’ve developed a relationship with assange… but i dont know much more than what he tells me, which is very little
(2:05:58 PM) Manning: it took me four months to confirm that the person i was communicating was in fact assange
(2:10:01 PM) Lamo: how’d you do that?
(2:12:45 PM) Manning: I gathered more info when i questioned him whenever he was being tailed in Sweden by State Department officials… i was trying to figure out who was following him… and why… and he was telling me stories of other times he’s been followed… and they matched up with the ones he’s said publicly
(2:14:28 PM) Lamo: did that bear out? the surveillance?
(2:14:46 PM) Manning: based on the description he gave me, I assessed it was the Northern Europe Diplomatic Security Team… trying to figure out how he got the Reykjavik cable…
(2:15:57 PM) Manning: they also caught wind that he had a video… of the Gharani airstrike in afghanistan, which he has, but hasn’t decrypted yet… the production team was actually working on the Baghdad strike though, which was never really encrypted
(2:16:22 PM) Manning: he’s got the whole 15-6 for that incident… so it wont just be video with no context
(2:16:55 PM) Manning: but its not nearly as damning… it was an awful incident, but nothing like the baghdad one
(2:17:59 PM) Manning: the investigating officers left the material unprotected, sitting in a directory on a centcom.smil.mil
(2:18:03 PM) Manning: server
(2:18:56 PM) Manning: but they did zip up the files, aes-256, with an excellent password… so afaik it hasn’t been broken yet
(2:19:12 PM) Manning: 14+ chars…
(2:19:37 PM) Manning: i can’t believe what im telling you =L

May 23

(7:19:12 AM) Lamo: hey you
(7:19:19 AM) Lamo: resend?
(7:19:19 AM) Manning: whats up?
(7:19:29 AM) Manning: i just said hello
(7:19:46 AM) Lamo: waking up. got up about an hour ago, 0615.
(7:20:10 AM) Manning: heh, the evening is still young here
(7:20:26 AM) Lamo: how’re you feeling today?
(7:20:37 AM) Manning: im feeling a little better…
(7:20:52 AM) Manning: i had a lot on my mind, keeping to myself
(7:22:18 AM) Lamo: anything new & exciting?
(7:24:21 AM) Manning: no, was outside in the sun all day… 110 degrees F, doing various details for a visiting band and some college team’s cheerleaders…
(7:24:43 AM) Lamo: cheerleaders.
(7:24:46 AM) Manning: ran a barbecue… but no-one showed up… threw a lot of food away
(7:25:20 AM) Manning: yes, football cheerleaders… visiting on off season… apart of Morale Welfare and Recreation (MWR) projects
(7:25:39 AM) Lamo: *sigh*
(7:26:01 AM) Manning: >shrug<
(7:26:37 AM) Manning: im sunburned… and smell like charcoal, sweat, and sunscreen… thats about all thats new
(7:26:47 AM) Lamo: Is there a Baghdad 2600 meeting? ;>
(7:28:04 AM) Manning: there’s only one other person im aware of that actually knows anything about computer security… he’s a SIGINT analyst, of course
(7:28:41 AM) Lamo: Is he the other one who pokes around t he network?
(7:29:26 AM) Manning: no… afaik, he doesn’t play around with classified networks… but im sure he’s capable
(7:30:09 AM) Lamo: then it stands to reason that you have at least 3 people who have some infosec knowledge
(7:31:15 AM) Manning: im not quite sure what you’re saying
(7:31:23 AM) Manning: infosec knowledge of what?
(7:31:29 AM) Manning: the networks?
(7:32:13 AM) Manning: i know a lot of computer security people
(7:32:44 AM) Lamo: i mean, in a way that would lend itself to a meeting.
(7:33:33 AM) Lamo: i’m writing a message trying to tie meetings together globally with a sampling of only ~3000 people to work with and get to go out and evangelize, so i have it on the brain
(7:33:50 AM) Manning: not really… different types of people… know how to, but dont
(7:34:33 AM) Manning: you don’t want these people having a meeting
(7:34:48 AM) Manning: though… i guess you do
______________________________

(8:01:30 AM) Lamo: Does Assange use AIM or other messaging services? I’d like to chat with him one of these days about opsec. My only credentials beyond intrusion are that the FBI never got my data or found me, before my negotiated surrender, but that’s something.
(8:01:53 AM) Lamo: And my data was never recovered.
(8:02:07 AM) Manning: no he does not use AIM
(8:02:37 AM) Lamo: How would I get ahold of him?
(8:02:59 AM) Manning: he would come to you
(8:03:26 AM) Lamo: I’ve never failed to get ahold of someone.
(8:03:29 AM) Manning: he does use OTR though… but discusses nothing OPSEC
(8:03:42 AM) Lamo: I cornered Ashcroft IRL, in the end.
(8:04:19 AM) Manning: he *might* use the ccc.de jabber server… but you didn’t hear that from me
(8:04:33 AM) Lamo: gotcha
(8:06:00 AM) Manning: im going to grab some dinner, ttyl
(8:06:18 AM) Lamo: http://www.facebook.com/photo.php?pid=31130826&id=704990
(8:06:47 AM) Lamo: i didn’t pass security, either. or rather, i did ;>
(8:06:52 AM) Lamo: enjoy dinner.
(8:06:55 AM) Lamo: twys.
(9:12:38 AM) Manning: bk
(9:22:54 AM) Manning: interesting… marine uniform… illegal, but certainly easy
(9:24:11 AM) Manning: why ashcroft?
(9:24:24 AM) Manning: oh, nevermind… DoJ
(9:24:29 AM) Manning: >yawn<
(9:26:52 AM) Manning: im really not familiar at all with FBI stuff
(9:27:04 AM) Manning: americans have so many more rights than non-americans
(9:31:42 AM) Manning: its awful
(9:46:11 AM) Lamo: Ashcroft´s DOJ tried to use the USA PATRIOT Act on me.
(10:06:24 AM) Lamo: around?
(10:12:34 AM) Manning: yeah
(10:12:57 AM) Lamo: are you baptist by any chance?
(10:13:34 AM) Manning: raised catholic… never believed a word of it
(10:13:59 AM) Manning: im godless… i guess i follow humanist values though
(10:14:15 AM) Manning: have custom dogtags that say “Humanist” [...]
(10:17:56 AM) Manning: i was the only non-religous person in town
(10:18:17 AM) Manning: more pews than people…
(10:18:37 AM) Manning: i understand them though
(10:18:53 AM) Manning: im not mean to them… they *really* don’t know
(10:19:39 AM) Manning: i politely disagree… but they are the ones who get uncomfortable when i make, very politely, good leading points…
(10:20:48 AM) Manning: (by leading points, i mean ask multiple questions, with obvious answers, then ask a question based on the answers from the previous questions that challenges their normal response to the same question) (10:21:26 AM) Manning: [excellent example of this: http://www.youtube.com/watch?v=2yhN1IDLQjo] (10:28:21 AM) Manning: new yorker is running 10k word article on wl.org on 30 may, btw
(10:33:07 AM) Lamo: one moment fone
(10:33:30 AM) Manning: (tracking device)
(10:37:28 AM) Manning: trust level increasing? [quantify]

May 25

(02:03:10 AM) Manning: amazing how the world works
(02:03:27 AM) Manning: takes 6 degrees of separation to a whole new level
(02:04:12 AM) Lamo: hey, vacaville
(02:04:18 AM) Lamo: er
(02:04:23 AM) Lamo: vacaville
(02:05:12 AM) Manning: its almost bookworthy in itself, how this played
(02:07:41 AM) Manning: event occurs in 2007, i watch video in 2009 with no context, do research, forward information to group of FOI activists, more research occurs, video is released in 2010, those involved come forward to discuss event, i witness those involved coming forward to discuss publicly, even add them as friends on FB… without them knowing who i am
(02:08:37 AM) Manning:they touch my life, i touch their life, they touch my life again… full circle
(02:08:58 AM) Lamo: Life’s funny.
(02:09:24 AM) Lamo: *random* are you concerned aboutCI/CID looking into your Wiki stuff? I was always paranoid.
(02:09:40 AM) Manning: CID has no open investigation
(02:10:28 AM) Manning: State Department will be uber-pissed… but I dont think they’re capable of tracing everything…
(02:10:44 AM) Lamo: what about CI?
(02:10:51 AM) Manning: might be a congressional investigation, and a joint effort to figure out what happened
(02:11:23 AM) Manning: CI probably took note, but it had no effect on operations
(02:11:48 AM) Manning: so, it was publicly damaging, but didn’t increase attacks or rhetoric…
(02:12:10 AM) Lamo: *nod*
(02:12:34 AM) Manning: re: joint effort will be purely political,”fact finding”… “how can we stop this from happening again”
(02:12:46 AM) Manning: regarding State Dept. cables
(02:13:12 AM) Lamo: Would the cables come from State?
(02:13:21 AM) Manning: yes
(02:13:25 AM) Manning: State Department
(02:13:29 AM) Lamo: I was always a commercial intruder.
(02:13:51 AM) Lamo: Why does your job afford you access?
(02:13:59 AM) Lamo: except for the UN.
(02:14:03 AM) Manning: because i have a workstation
(02:14:15 AM) Lamo: and World Bank.
(02:14:17 AM) Manning: *had*
(02:14:36 AM) Lamo: So you have these stored now?
(02:14:54 AM) Manning: i had two computers… one connected to SIPRNET the other to JWICS…
(02:15:07 AM) Manning: no, they’re government laptops
(02:15:18 AM) Manning: they’ve been zerofilled
(02:15:22 AM) Manning: because of the pullout
(02:15:57 AM) Manning: evidence was destroyed… by the system itself
(02:16:10 AM) Lamo: So how would you deploy the cables? If at all.
(02:16:26 AM) Manning: oh no… cables are reports
(02:16:34 AM) Lamo: ah
(02:16:38 AM) Manning: State Department Cable = a Memorandum (
(02:16:48 AM) Lamo: embassy cables?
(02:16:54 AM) Manning: yes
(02:17:00 AM) Manning: 260,000 in all
(02:17:10 AM) Manning: i mentioned this previously
(02:17:14 AM) Lamo: yes
(02:17:31 AM) Lamo: stored locally, or retreiveable?
(02:17:35 AM) Manning: brb latrine =P
(02:17:43 AM) Manning: i dont have a copy anymore
(02:17:59 AM) Lamo: *nod* (02:18:09 AM) Manning: they were stored on a centralized server…
(02:18:34 AM) Lamo: what’s your endgame plan, then?
(02:18:36 AM) Manning: it was vulnerable as fuck
(02:20:57 AM) Manning: well, it was forwarded to WL
(02:21:18 AM) Manning: and god knows what happens now
(02:22:27 AM) Manning: hopefully worldwide discussion, debates, and reforms
(02:23:06 AM) Manning: if not… than we’re doomed
(02:23:18 AM) Manning: as a species
(02:24:13 AM) Manning: i will officially give up on the society we have if nothing happens
(02:24:58 AM) Manning: the reaction to the video gave me immense hope… CNN’s iReport was overwhelmed… Twitter exploded…
(02:25:18 AM) Manning: people who saw, knew there was something wrong
(02:26:10 AM) Manning: Washington Post sat on the video… David Finkel acquired a copy while embedded out here
(02:26:36 AM) Manning: [also reason as to why there's probably no investigation]
(02:28:10 AM) Manning: i want people to see the truth… regardless of who they are… because without information, you cannot make informed decisions as a public
(02:28:10 AM) Lamo : I’m not here right now
(02:28:50 AM) Manning: if i knew then, what i knew now… kind of thing…
(02:29:31 AM) Manning: or maybe im just young, naive, and stupid…
(02:30:09 AM) Lamo: which do you think it is?
(02:30:29 AM) Manning: im hoping for the former
(02:30:53 AM) Manning: it cant be the latter
(02:31:06 AM) Manning: because if it is… were fucking screwed
(02:31:12 AM) Manning: (as a society)
(02:31:49 AM) Manning: and i dont want to believe that we’re screwed
(02:32:53 AM) Manning: food time… ttys
______________________________

(02:26:01 PM) Manning: i dont believe in good guys versus bad guys anymore… i only a plethora of states acting in self interest… with varying ethics and moral standards of course, but self-interest nonetheless
(02:26:18 PM) Manning: s/only/only see/
(02:26:47 PM) Lamo: the tm meant i was being facetious
(02:26:59 PM) Manning: gotchya
(02:27:47 PM) Manning: i mean, we’re better in some respects… we’re much more subtle… use a lot more words and legal techniques to legitimize everything
(02:28:00 PM) Manning: its better than disappearing in the middle of the night
(02:28:19 PM) Manning: but just because something is more subtle, doesn’t make it right
(02:29:04 PM) Manning: i guess im too idealistic
(02:31:02 PM) Manning: i think the thing that got me the most… that made me rethink the world more than anything
(02:35:46 PM) Manning: was watching 15 detainees taken by the Iraqi Federal Police… for printing “anti-Iraqi literature”… the iraqi federal police wouldn’t cooperate with US forces, so i was instructed to investigate the matter, find out who the “bad guys” were, and how significant this was for the FPs… it turned out, they had printed a scholarly critique against PM Maliki… i had an interpreter read it for me… and when i found out that it was a benign political critique titled “Where did the money go?” and following the corruption trail within the PM’s cabinet… i immediately took that information and *ran* to the officer to explain what was going on… he didn’t want to hear any of it… he told me to shut up and explain how we could assist the FPs in finding *MORE* detainees…
(02:35:46 PM) Lamo : I’m not here right now
(02:36:27 PM) Manning: everything started slipping after that… i saw things differently
(02:37:37 PM) Manning: i had always questioned the things worked, and investigated to find the truth… but that was a point where i was a *part* of something… i was actively involved in something that i was completely against…
(02:38:12 PM) Lamo: That could happen in Colombia.
(02:38:21 PM) Lamo: Different cultures, dude.
(02:38:28 PM) Lamo: Life is cheaper.
(02:38:34 PM) Manning: oh im quite aware
(02:38:45 PM) Lamo: What would you do if your role /w Wikileaks seemed in danger of being blown?
(02:38:48 PM) Manning: but i was a part of it… and completely helpless…
(02:39:01 PM) Lamo: sometimes we’re all helpless
(02:39:34 PM) Manning: try and figure out how i could get my side of the story out… before everything was twisted around to make me look like Nidal Hassan
(02:40:15 PM) Manning: i dont think its going to happen
(02:40:26 PM) Manning: i mean, i was never noticed
(02:41:10 PM) Manning: regularly ignored… except when i had something essential… then it was back to “bring me coffee, then sweep the floor”
(02:42:24 PM) Manning: i never quite understood that
(02:42:44 PM) Manning: felt like i was an abused work horse…
(02:43:33 PM) Manning: also, theres god awful accountability of IP addresses…
(02:44:47 PM) Manning: the network was upgraded, and patched up so many times… and systems would go down, logs would be lost… and when moved or upgraded… hard drives were zeroed
(02:45:12 PM) Manning: its impossible to trace much on these field networks…
(02:46:10 PM) Manning: and who would honestly expect so much information to be exfiltrated from a field network?
(02:46:25 PM) Lamo: I’d be one paranoid boy in your shoes.
(02:47:07 PM) Manning: the CM video came from a server in our domain! and not a single person noticed
(02:47:21 PM) Lamo: CM?
(02:48:17 PM) Manning: Apache Weapons Team video of 12 JUL 07 airstrike on Reuters Journos… some sketchy but fairly normal street-folk… and civilians
(02:48:52 PM) Lamo: How long between the leak and the publication?
(02:49:18 PM) Manning: some time in february
(02:49:25 PM) Manning: it was uploaded
(02:50:04 PM) Lamo: uploaded where? how would i transmit something if i had similarly damning data
(02:51:49 PM) Manning: uhm… preferably openssl the file with aes-256… then use sftp at prearranged drop ip addresses
(02:52:08 PM) Manning: keeping the key separate… and uploading via a different means
(02:52:31 PM) Lamo: so i myself would be SOL w/o a way to prearrange
(02:54:33 PM) Manning: not necessarily… the HTTPS submission should suffice legally… though i’d use tor on top of it…
(02:54:43 PM) Manning: but you’re data is going to be watched
(02:54:44 PM) Manning: *your
(02:54:49 PM) Manning: by someone, more than likely
(02:54:53 PM) Lamo: submission where?
(02:55:07 PM) Manning: wl.org submission system
(02:55:23 PM) Lamo: in the massive queue?
(02:55:54 PM) Manning: lol, yeah, it IS pretty massive…
(02:55:56 PM) Manning: buried
(02:56:04 PM) Manning: i see what you mean
(02:56:35 PM) Manning: long term sources do get preference… i can see where the “unfairness” factor comes in
(02:56:53 PM) Lamo: how does that preference work?
(02:57:47 PM) Manning: veracity… the material is easy to verify…
(02:58:27 PM) Manning: because they know a little bit more about the source than a purely anonymous one
(02:59:04 PM) Manning: and confirmation publicly from earlier material, would make them more likely to publish… i guess…
(02:59:16 PM) Manning: im not saying they do… but i can see how that might develop
(03:00:18 PM) Manning: if two of the largest public relations “coups” have come from a single source… for instance
(03:02:03 PM) Manning: you yeah… purely *submitting* material is more likely to get overlooked without contacting them by other means and saying hey, check your submissions for x… Manning described the first time he watched the Iraq video, after finding it in a network directory where an Army JAG officer left it. He speculated that Washington Post writer and book author David Finkel already had a copy of the video when he wrote his book The Good Soldiers, published last year.
(03:07:26 PM) Manning: i recognized the value of some things…
______________________________

(03:07:33 PM) Manning: knew what they meant… dug deeper
(03:07:53 PM) Manning: i watched that video cold, for instance
(03:10:32 PM) Manning: at first glance… it was just a bunch of guys getting shot up by a helicopter… no big deal… about two dozen more where that came from right… but something struck me as odd with the van thing… and also the fact it was being stored in a JAG officer’s directory… so i looked into it… eventually tracked down the date, and then the exact GPS co-ord… and i was like… ok, so thats what happened… cool… then i went to the regular internet… and it was still on my mind… so i typed into goog… the date, and the location… and then i see this http://www.nytimes.com/2007/07/13/world/middleeast/13iraq.html
(03:11:07 PM) Manning: i kept that in my mind for weeks… probably a month and a half… before i forwarded it to [Wikileaks]
(03:11:54 PM) Manning: then there was the Finkel book
(03:12:16 PM) Manning: im almost certain he had a copy Manning discussed how common and easy it was for soldiers to bring removable media into their work environment, making it easy for him, or anyone else, to siphon data from classified networks without raising suspicion.

Time Lapse

[Wired chat logs drop back one hour with; context suggests these are not from the May 25 sequence]

(01:52:30 PM) Manning: funny thing is… we transffered so much data on unmarked CDs…
(01:52:42 PM) Manning: everyone did… videos… movies… music
(01:53:05 PM) Manning: all out in the open
(01:53:53 PM) Manning: bringing CDs too and from the networks was/is a common phenomeon
(01:54:14 PM) Lamo: is that how you got the cables out?
(01:54:28 PM) Manning: perhaps
(01:54:42 PM) Manning: i would come in with music on a CD-RW
(01:55:21 PM) Manning: labelled with something like “Lady Gaga”… erase the music… then write a compressed split file
(01:55:46 PM) Manning: no-one suspected a thing
(01:55:48 PM) Manning: =L kind of sad
(01:56:04 PM) Lamo: and odds are, they never will
(01:56:07 PM) Manning: i didnt even have to hide anything
(01:56:36 PM) Lamo: from a professional perspective, i’m curious how the server they were on was insecure
(01:57:19 PM) Manning: you had people working 14 hours a day… every single day… no weekends… no recreation…
(01:57:27 PM) Manning: people stopped caring after 3 weeks
(01:57:44 PM) Lamo: i mean, technically speaking
(01:57:51 PM) Lamo: or was it physical
(01:57:52 PM) Manning: >nod<
(01:58:16 PM) Manning: there was no physical security
(01:58:18 PM) Lamo: it was physical access, wasn’t it
(01:58:20 PM) Lamo: hah
(01:58:33 PM) Manning: it was there, but not really
(01:58:51 PM) Manning: 5 digit cipher lock… but you could knock and the door…
(01:58:55 PM) Manning: *on
(01:59:15 PM) Manning: weapons, but everyone has weapons
(02:00:12 PM) Manning: everyone just sat at their workstations… watching music videos / car chases / buildings exploding… and writing more stuff to CD/DVD… the culture fed opportunities
(02:01:44 PM) Manning: hardest part is arguably internet access… uploading any sensitive data over the open internet is a bad idea… since networks are monitored for any insurgent/terrorist/militia/criminal types
(02:01:52 PM) Lamo: tor?
(02:02:13 PM) Manning: tor + ssl + sftp
(02:02:33 PM) Lamo: *nod*
(02:03:05 PM) Lamo: not quite how i might do it, but good
(02:03:22 PM) Manning: i even asked the NSA guy if he could find any suspicious activity coming out of local networks… he shrugged and said… “its not a priority”
(02:03:53 PM) Manning: went back to watching “Eagle’s Eye”
______________________________

(02:12:23 PM) Manning: so… it was a massive data spillage… facilitated by numerous factors… both physically, technically, and culturally
(02:13:02 PM) Manning:: perfect example of how not to do INFOSEC
(02:14:21 PM) Manning: listened and lip-synced to Lady Gaga’s Telephone while exfiltratrating possibly the largest data spillage in american history
(02:15:03 PM) Manning: pretty simple, and unglamorous
(02:16:37 PM) Manning: *exfiltrating
(02:17:56 PM) Manning: weak servers, weak logging, weak physical security, weak counter-intelligence, inattentive signal analysis… a perfect storm
(02:19:03 PM) Manning: >sigh<
(02:19:19 PM) Manning: sounds pretty bad huh?
(02:20:06 PM) Lamo: kinda :x
(02:20:25 PM) Manning: :L
(02:20:52 PM) Lamo: i mean, for the .mil
(02:21:08 PM) Manning: well, it SHOULD be better
(02:21:32 PM) Manning: its sad
(02:22:47 PM) Manning: i mean what if i were someone more malicious
(02:23:25 PM) Manning: i could’ve sold to russia or china, and made bank?
(02:23:36 PM) Lamo: why didn’t you?
(02:23:58 PM) Manning: because it’s public data
(02:24:15 PM) Lamo: i mean, the cables
(02:24:46 PM) Manning: it belongs in the public domain
(02:25:15 PM) Manning: information should be free
(02:25:39 PM) Manning: it belongs in the public domain
(02:26:18 PM) Manning: because another state would just take advantage of the information… try and get some edge
(02:26:55 PM) Manning: if its out in the open… it should be a public good
(02:27:04 PM) Manning: *do the
(02:27:23 PM) Manning: rather than some slimy intel collector
(02:29:18 PM) Manning: im crazy like that
______________________________

(03:38:07 PM) Manning: its not much of a pic, but here’s harry ponting http://farm4.static.flickr.com/3161/2814062024_c39d25f27d.jpg the man who’s mission it is to sell the benefits of NCD throughout the State Department, Military, and IC
(03:38:18 PM) Manning: i feel terribly, terribly sorry for the guy :(
(03:39:17 PM) Manning: im not a bad person, i keep track of everything
(03:39:30 PM) Manning: i watch the whole thing unfold… from a distance
(03:40:07 PM) Manning: i read what everyone says… look at pictures… keep tabs… and feel for them
(03:40:18 PM) Manning: since im basically playing a vital role in their life
(03:40:29 PM) Manning: without ever meeting them
(03:40:53 PM) Manning: i was like that as an intelligence analyst as well
(03:41:09 PM) Lamo: i know the feeling, in a way.
(03:41:44 PM) Manning: most didnt care… but i knew, i was playing a role in the lives of hundreds of people, without them knowing them… but i cared, and kept track of some of the details, make sure everybody was okay
(03:42:07 PM) Manning: them knowing me
(03:43:27 PM) Manning: i dont think of myself as playing “god” or anything, because im not… im just playing my role for the moment… i dont control the way they react
(03:44:15 PM) Manning: there are far more people who do what i do, in state interest, on daily basis, and dont give a fuck
(03:45:01 PM) Manning: thats how i try to separate myself
(03:45:13 PM) Manning: from my (former) colleagues Lamo asked what additional material Manning gave to Julian Assange at Wikileaks.
______________________________

(04:32:05 PM) Manning: oh, the JTF GTMO papers… Assange has those too
(04:32:16 PM) Lamo: Read it.
(04:33:21 PM) Lamo: Anything else interesting on his table, as a former collector of interesting .com info?
(04:33:44 PM) Manning: idk… i only know what i provide him xD
(04:34:14 PM) Lamo: what do you consider the highlights?
(04:35:31 PM) Manning: The Gharani airstrike videos and full report, Iraq war event log, the “Gitmo Papers”, and State Department cable database
(04:35:50 PM) Lamo: Not too shabby.
(04:36:03 PM) Manning: thats just me….
(04:36:26 PM) Manning: idk about the rest… he *hopefully* has more
______________________________

(04:42:16 PM) Manning: im not sure whether i’d be considered a type of “hacker”, “cracker”, “hacktivist”, “leaker” or what…
(04:42:26 PM) Manning: im just me… really
(04:44:21 PM) Manning: starts off like every physics / astro class intro… ever
(04:44:21 PM) Lamo : I’m not here right now
(04:44:45 PM) Manning: albeit without the algebraic proofs
(04:45:20 PM) Lamo: or a spy :)
(04:45:48 PM) Manning: i couldn’t be a spy…
(04:45:59 PM) Manning: spies dont post things up for the world to see
(04:46:14 PM) Lamo: Why? Wikileaks would be the perfect cover
(04:46:23 PM) Lamo: They post what’s not useful
(04:46:29 PM) Lamo: And keep the rest
______________________________

Wired, 6/10/2010: “[Manning] said that Julian Assange had offered him a position at Wikileaks. But he said, ‘I’m not interested right now. Too much excess baggage.’”
Manning: my family is non-supportive . . . im losing my job . . . losing my career options . . . i dont have much more except for this laptop, some books, and a hell of a story.
Manning: i’m exhausted . . . in desperation to get somewhere in life . . . i joined the army . . . and that’s proven to be a disaster now . . . and now i’m quite possibly on the verge of being the most notorious ‘hacktivist’ or whatever you want to call it . . . its all a big mess i’ve created.

“[Manning] confided in Lamo that he was homeless in 2006 and had drifted from Tulsa to Chicago before landing at his aunt’s house in Potomac.”

Claims made about other things contained in the chat logs, not included in the releases:

Wired, 6/6/2010: “Manning told Lamo that he enlisted in the Army in 2007 and held a Top Secret/SCI clearance, details confirmed by his friends and family members.”
CBC Radio, 6/7/2010: LAMO: “[Manning] also also mentioned to me a top secret operation that the Army for lack of a better word freaked out over when I mentioned it to them. They would not even say it out loud, they wrote it on paper and showed it to somebody else when discussing it….It was when I initially confirmed through a friend of mine who had experience in military counterintelligence and had him virtually blanche — or at least I imagined over the telephone — when I mentioned the operation, that I knew that I had to act.”
New York Times, 6/7/2010: “[Lamo] said that Army investigators were particularly concerned about one sensitive piece of information that Specialist Manning possessed that Mr. Lamo would not discuss in more detail.”

Washingtonian, 6/8/2010: “Lamo declines to elaborate on the nature of any condition or the circumstances behind Manning’s discharge but says that Manning described them …When The Washingtonian asked whether Manning was being discharged under “don’t ask, don’t tell,” Lamo said, “It’s not my place to speak on Mr. Manning’s behalf. In general terms, he was not a supporter of the [DADT] policy, as a number of soldiers are, both straight and gay.” Lamo says that Manning expressed his views on the military’s policy “at least in passing once or twice”… Lamo says that Manning never showed him the cables but that after he mentioned a specific military operation by name, Lamo was afraid he could become implicated in Manning’s alleged leak.”
Wired, 6/10/2010: “He said that Julian Assange had offered him a position at Wikileaks. But he said, ‘I’m not interested right now. Too much excess baggage.’”

Risky Business, 6/10/2010: LAMO: “There were issues other than the cables that I can’t get into that were very specific and did have significant ramifications in terms of our safety, both economic and national.”
CNET, 6/12/2010: “Manning told Lamo that he leaked the code name and details of a government investigation being conducted regarding the attacks on Google, Lamo said.”
AOL, 7/21/2010: “Their [Army counterintelligence's] immediate response when I related the code name for one of the operations was ‘Never say those words again,’ ” Lamo told me. “Literally, ‘Forget you ever heard those words.’ And when I met with two federal agents to discuss them, they had me write it down on a piece of paper rather than say it aloud.”
CNN.com, 7/29/2010: “As far as I know, he conducted the database himself but got technical assistance from another source,” Lamo said. “[Manning] was aware of one other person in military engaged in accessing databases without authorization.”

CNN.com, 7/30/2010: “[Lamo] also said that the logs contained personal information that he does not want exposed. And that there’s information that he has that no one has seen, that could compromise National Security.
CNN, 7/30/2010: “I expressed to him that it could be very well considered espionage. And he respectfully disagreed….Bradley Manning did leak to me information related to ongoing classified counter intelligence operations, which based on my interaction with the United States’ Army and defense authorities, were considered highly sensitive….[Manning] had approached the local national security agency operative at Forward Operating Base Hammer, where he was stationed, and inquired of them whether or not they had detected any suspicious traffic. And the answer to that was, no, at which point they went back to watching a movie.”
Boston Globe, 8/1/2010: “Adrian Lamo, a former computer hacker who traded instant messages with Manning and later turned him in to authorities, said he knew of five people whom Army officials have interviewed over the past few months in the Boston area…Lamo said he doubts Manning had the technical savvy to copy all the data on his own. He thinks Manning received help from hackers in the area who provided him with encryption software to send the classified information to WikiLeaks, and who helped him ensure those leaks were featured prominently on the website….Lamo said he thinks the group in Boston provided Manning with software that allowed him to download thousands of documents without alerting network monitors at the Defense Department. He added that Manning had one of his associates in Boston physically provide WikiLeaks with documents he downloaded on CDs.”

CNN.com, 8/4/2010: “Lamo confirmed he told Manning the soldier’s online conversations could be protected under the California shield law because it could be seen as a conversation with a journalist. Lamo says he does consider himself a journalist and that he made the offer in good faith.”
BBC News, 8/6/2010: “I was a private citizen in a private capacity – there was no source, journalist relationship,” [Lamo] told BBC News. “I did tell him that I worked as a journalist. I would have been happy to write about him myself, but we just decided that it would be too unethical.”
New York Times, 12/16/2010: “Private Manning is said to claim that he had been directly communicating with Mr. Assange using an encrypted Internet conferencing service as the soldier was downloading government files. Private Manning is also said to have claimed that Mr. Assange gave him access to a dedicated server for uploading some of them to WikiLeaks. Adrian Lamo, an ex-hacker in whom Private Manning confided and who eventually turned him in, said Private Manning detailed those interactions in instant-message conversations with him. He said the special server’s purpose was to allow Private Manning’s submissions to “be bumped to the top of the queue for review.” By Mr. Lamo’s account, Private Manning bragged about this “as evidence of his status as the high-profile source for WikiLeaks….Wired magazine has published excerpts from logs of online chats between Mr. Lamo and Private Manning. But the sections in which Private Manning is said to detail contacts with Mr. Assange are not among them. Mr. Lamo described them from memory in an interview with The Times, but he said he could not provide the full chat transcript because the F.B.I. had taken his hard drive, on which it was saved.”

Vía firedoglake (FDL)